Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
fd4a5c01d3b10976ae44029e7672e1b0.exe
Resource
win7-20231215-en
General
-
Target
fd4a5c01d3b10976ae44029e7672e1b0.exe
-
Size
672KB
-
MD5
fd4a5c01d3b10976ae44029e7672e1b0
-
SHA1
50a8d46d87c47572e6f30dfafd11ce9964c064ab
-
SHA256
378a19ddfac8651e76b0abb65fb7afd10e973322be7148a8f97adb16dbd057a9
-
SHA512
ee524662d83f36ce0c5da186e26332b97d2bea4a507734d8a8dbcd8da4732e2e279235481eb9e2b657d84632e7cd7e12070337e1575d0169315b3c5e3829be18
-
SSDEEP
12288:seBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:sJIUCNd0nKwYvX+UhbW9eM
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 10 IoCs
pid Process 464 Process not Found 2984 alg.exe 2592 aspnet_state.exe 2548 mscorsvw.exe 1736 mscorsvw.exe 1324 mscorsvw.exe 2308 mscorsvw.exe 2768 dllhost.exe 1540 mscorsvw.exe 860 mscorsvw.exe -
Loads dropped DLL 6 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-928733405-3780110381-2966456290-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-928733405-3780110381-2966456290-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\U: alg.exe -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\alg.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\klemajnb.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\svchost.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\ui0detect.exe alg.exe File created \??\c:\windows\system32\pjoifecj.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\dllhost.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\ieetwcollector.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\system32\nclnmbkm.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\system32\inckjnho.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created \??\c:\program files (x86)\microsoft office\office14\hcfcgpop.tmp alg.exe File created \??\c:\program files (x86)\common files\microsoft shared\source engine\nkdnmkfb.tmp alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\leafaomd.tmp alg.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\pkjbgdna.tmp alg.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe fd4a5c01d3b10976ae44029e7672e1b0.exe -
Drops file in Windows directory 40 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe alg.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe alg.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{5789C16D-4E13-47B9-8F46-767C7BEB86B6}.crmlog dllhost.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe alg.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\dpbdplqi.tmp alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe alg.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{5789C16D-4E13-47B9-8F46-767C7BEB86B6}.crmlog dllhost.exe File opened for modification \??\c:\windows\ehome\ehsched.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created \??\c:\windows\microsoft.net\framework\v2.0.50727\bdbqjhja.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\ehome\ehsched.exe alg.exe File created \??\c:\windows\ehome\kgebljcp.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\jqbhgmpc.tmp alg.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\jdlpfnjo.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created \??\c:\windows\ehome\ionocdcf.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\kiejmhep.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\fgpcmegc.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe alg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2984 alg.exe 2984 alg.exe 2984 alg.exe 2984 alg.exe 2984 alg.exe 2984 alg.exe 2984 alg.exe 2984 alg.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2200 fd4a5c01d3b10976ae44029e7672e1b0.exe Token: SeTakeOwnershipPrivilege 2984 alg.exe Token: SeShutdownPrivilege 2308 mscorsvw.exe Token: SeShutdownPrivilege 2308 mscorsvw.exe Token: SeShutdownPrivilege 2308 mscorsvw.exe Token: SeShutdownPrivilege 2308 mscorsvw.exe Token: SeShutdownPrivilege 2308 mscorsvw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1540 2308 mscorsvw.exe 37 PID 2308 wrote to memory of 1540 2308 mscorsvw.exe 37 PID 2308 wrote to memory of 1540 2308 mscorsvw.exe 37 PID 2308 wrote to memory of 860 2308 mscorsvw.exe 38 PID 2308 wrote to memory of 860 2308 mscorsvw.exe 38 PID 2308 wrote to memory of 860 2308 mscorsvw.exe 38 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2984
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2592
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2548
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1736
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:1324
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 184 -InterruptEvent 170 -NGENProcess 174 -Pipe 180 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 17c -InterruptEvent 218 -NGENProcess 220 -Pipe 224 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:860
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5007ab38408a11fab2f3fa3cbc09db108
SHA102ad4cb3663f9f008d584220a77d4ff5201e72a1
SHA25692734bc8b668f2c8b6f41233fe15ca2660e2d04503e11407d443d27c6a6f6d77
SHA5126ce8bfd05aedaa7b92693726005163fd002713012b3384a1646c6545ee088d140a00426633a2b33fa409966fb23cdb17affe07a397807601bf0a47e8fe77e2a3
-
Filesize
872KB
MD560904b7250e399a88e6249ea70571578
SHA1690e40d2050caa4872680802db1b98229e8e23b8
SHA25645712da7798314a28ce86323cb9e8ea84a1b4402d1f4cc166d9b1c43edc16c26
SHA51262323b19a80ad85198d0e116d3ff76f8ac82cff7103686bb2df0880eea6ebf483150eae6e6d280055a16b8eb4ec44ae0424718e892f66712197c3f9da8d3bfaa
-
Filesize
257KB
MD57cb6a346608111defffcb417e5747602
SHA107f76eb105e6ad3143355fda920ac032fd763387
SHA2567938be3a7e9827c3fd771036f5cb946483ae8b3d12c799e517ca5d52a361fe62
SHA512b87157a6a73c639b600154c5e9a89562cec3108fc0d8a08fe73733bc13b425743e763db814abc6384b1f1e02d4f8e6f7bf4cbb88fcac1f76789796e1c4ae3914
-
Filesize
453KB
MD5cad77d6732386173df7e15d75d9e1d73
SHA17624232526db6399fb28a90339f9c66d3c3148ac
SHA25608c088eead8d9a27d3157cdf9381362bf6ac9f4dadae01aa40bde91c93c8bc16
SHA5128660f45c9828a0e50169fb754e04bb63e1555b292e6163356bcde70b76fa994dc8053e4b5ea0ffc2d68b906caac654fb2e23b6b07ef6b37de8f78628930b7e83
-
Filesize
1003KB
MD5551f26f3fa5831769bca0d96e9a64c67
SHA11ac6439398fb9f085da7bf878877d721c3dffa37
SHA256c7c990fd2e56e1817333ecf02111b7ce74ef40286e3a421c0e64b5b5b5fca860
SHA5122b83a73828b26b61c05dd88ebcafbd2ff7c31736d7308a14b09720754226c535cd120068d201b2540f44b03a5bd68f0d875b497d57af98ef6d0a781125e45051
-
Filesize
92KB
MD5c2a4642e07fdcc66f593cd02eb3eeff3
SHA16524bad1fd395fd3804bef0b90b9fbcbcc89a750
SHA256e5e260ca42b67266667c0e9d912c476e2ec44fae1082a1fcc8cc48860b830ccb
SHA512ed1b8301ce96521aa4d4c458e1fbc8ea80f9a7c8bf6985ca7c9226fe2bfc6f7e23cf45fef89d98dda30cfd5045031ed3f4ca9f6e64f70cde3c4deea3ec6f8eeb
-
Filesize
405KB
MD59ca2c69eec5b4fa8fde1554170acf9d0
SHA16fd4fe15ed3269469436609ebf4dbb148676934a
SHA256b0a2873c91a609535b5ab0a66b0e84858aea41cf2042b0de1349a061ea169a4f
SHA5120ea82342532b2de668d5dbb89d3ce3e07256e6159cf584ae1081e7b4477b779ebb480ded4720362e270fbe2253497f0cb33fbc91381f0b10f112709901512b01
-
Filesize
381KB
MD598dcd4a8cda99aeb728ff946903d76e6
SHA1798237beeedb69e1d2337f8737ecc3381cb3fa2f
SHA2564fcf729c0b569dd8e4fa56cb9e7c674bfbf1167214c2d009637177fd32ce07fb
SHA5126dcbb2a5892b3c2405cc54e776d995acf715865fadfee5066ff76f3281c17b35b1e207c3bf9d9c93b2b4261fd9c41cc07962caff208228e008499f4a66e21ba6
-
Filesize
613KB
MD5f8b9fc27f5b63c53af34a7630dc1e2f6
SHA154b9de6bf5d06421990ea859d4987194c7543018
SHA256567c1e889eb77e859069a0655bd58b2f2fc3cc64c4774c204ddb336013f5787a
SHA512390a89fbeb22dd4954fb1579c7187279f57e557d078c1582a7938d260f509599cb09e07b8603deeb32cf433b87095ebe4901d28d96c32452cc507e780d4d8cdb
-
Filesize
217KB
MD5dc6d67c8a804d42c8e51d00072e5916c
SHA16d4f271dcb97367d8772b2a24ffb4dfe187306b4
SHA256225a6ebedd6543734da4218b0420eab50464ec4bcea325734cc1bc631fd71868
SHA5124750d709f8ff6b14462a71ee88153a01ba08292e104648dc5b7d340a5edda1394d4851a15860a2285be1161f10136429371bde8d4b64f8140829d84f7b503b39
-
Filesize
506KB
MD547c9473fb11cc0fe68fb38e0ac4b7700
SHA1bd4902e7782ee06e04598a0d2139eb9aed5ac42f
SHA256c687a70e3a3b590c3f75d9e0345c6baad4b4298db353609b6dc69846615bbed3
SHA512b082c1dcb0a1e2263dacf22d8f288ce2911ff60a71d4b17f703256dbc838654adf382dd33ce76b4019d6205e70c61e68c27f316d73e61a81ae445b3231b85c63
-
Filesize
484KB
MD58e6309b5a8bea44d44691dafe3990081
SHA1caff5e8ceeb8171b0d2fc04b8316b33da0b676e9
SHA2567af5a25c6f8e7e22c070edb2fdf2540d99204197aed096789838cd9ce205b9df
SHA5122318f860cbad2776e7ff5625718f21e8b6b3b9ac438fea5e31d41e186da8488353dff9837255c8dd1f8ca6279f0e6387cb2f0172cd5f02798ebb9de3e8e86251
-
Filesize
480KB
MD57c85be363eb0fd3f77ba0db449fc165f
SHA1c26c42574bf2a0dd76fb218089812cad5308b2f0
SHA256a046a6646f3ec6e0b6324f00fd283af3bd33f9726fcbd99be0f355c044fffc06
SHA5128ee58b9d26a864281b636a6af530487c08d4e44d12e8ee35673ad7342443a1b7b38fd2fa74e76bbe3ea482cb7781978784aaa09b37e11a68a89e37e0c36147de
-
Filesize
431KB
MD51e4083235237847e4bdbe5920e263c78
SHA1f8254086761fce4d4fc7cbe97535128ada4a1b48
SHA256106a8919e5ff1eaa6b3b7001f0229c24c436a87d74a964e015cd8b5f9e7e5b77
SHA512ec96672f93de36049cd7f8596173c440265e67325bf3228e233fbf8dc46c595ce73e69c6592918d0f6a77a6325ee3ff7092d2bb511a9e5c22b110c7f7559352f
-
Filesize
472KB
MD53d944b6bc8a8f4d9a1284422f5f3d8cd
SHA12e0a7ed1d18a1b0bfabfcb1c453e4c86b0e9bc9e
SHA2564ee4f0dc5b3b50eaaaa979fb6ad65a5e9233d507bf1faa14ed0113a9e62b87e5
SHA51264c9b611e6ccc3504673c75c3e4c5fd7891a79e5843d4f07bc870fc87706268f875c65927675328c4f1a86eaf373fbfe9bdefb7d4c6ef3df1658cd4d5fd044a3